Completed
Kali on Windows WSL for Pentester & Bug Bounty Hunter | Local Recon | Hacking Machine | No VPS / VM
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Bug Bounty
Automatically move to the next video in the Classroom when playback concludes
- 1 The Plan - Finding a program - Bug Bounty - Ep - 01
- 2 Scope Review and Bug Hunting Using Github Dorks - Bug Bounty - Ep - 02
- 3 Recon 01 - Recon Infrastructure Map Setting up VPS + Assetfinder + Subfinder - Bug Bounty - Ep - 03
- 4 Amass Setup and Tutorial
- 5 Collecting Subdomains - Part 2 | Automating the process | First Steps to your personal Recon Toolkit
- 6 Collecting Subdomains - Part 1 | Amass | Subfinder | Assetfinder | Findomain
- 7 Recon - Scan them all | Port Scanning ft. nmap + Short Videos Announcement
- 8 XSS CSP Bypass - BugPoC Challenge
- 9 Kali on Windows WSL for Pentester & Bug Bounty Hunter | Local Recon | Hacking Machine | No VPS / VM
- 10 Local Recon Machine - Kali on Windows ft. WSL | Final Part - Pt.2 | Recon on a live site
- 11 Automate your Bug Hunting using Nuclei | Writing our own nuclei template | Be The H.A.C.R. - Ep. 18
- 12 XXE - What Why & How | XXE on Twitter | $10k Bounty | XML External Entity
- 13 Automating IDORS with Autorize - Common API Bugs Pt. 2 - IDORs & Access Control Issues
- 14 Hacking Oauth Applications - Pt. 1
- 15 Flawed CSRF Protection - State Param - Hacking Oauth Pt . 2 | Live Demo on Medium.com
- 16 Free Automated Recon Using Github Actions | Ft. Project Discovery